New Search

The SSLv2 protocol as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products requires a server to send a ServerVerify message - CVE-2016-0800

oval:org.cisecurity:def:3512

The SSLv2 protocol as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle aka a "DROWN" attack.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows 8.1
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2012 R2
  • Microsoft Windows Server 2012
  • Microsoft Windows 10
  • Microsoft Windows 7
Class:
vulnerability
Reference(s):
  • CVE-2016-0800
Product(s):
  • OpenSSL